| ER Models | ERM References | ERM Anthologies |
| Model No. | 82 | |||
| Short Citation | (Oh/Navathe 1995) | |||
| Year | 1995 | |||
| Special Name | SEER (Security Enhanced ER) | |||
| Descendant of | (Chen 1976) | |||
| Constructs | Inherent | Entity Type | sd: user group | |
| Relationship Type | sd: security | |||
| Value Sets / Attributes | X | |||
| New | Invented | Adapted | ||
| Included | ||||
| Borrowed | Included | |||
| Added | ||||
| Syntactic Rules | Security relationship connects user, entity or relationship types. | |||
| Semantics | informal | |||
| Focus | t | |||
| Data Definition | ||||
| Data Manipulation | ||||
| Remarks | ||||
| Cause | Citation | ... address the conceptual modeling of security features and authorization histories... (p. 170). | ||
| Content | Expressiveness | domain (security) | ||
| Applicability | ||||
| Correction | ||||
| Integration | ||||
| Implementation | ||||
| Other | ||||
| Alternative Publications | ||||
| Binary Vector | Structure/General | [E1] | ||
| [E2] | m | |||
| [E3] | ||||
| [E4] | ||||
| [E5] | 1 | |||
| [E6] | ||||
| Structure/Integrity | [E7] | m | ||
| [E8] | ||||
| [E9] | ||||
| [E10] | m | |||
| [E11] | ||||
| [E12] | ||||
| [E13] | ||||
| [E14] | ||||
| [E15] | ||||
| [E16] | ||||
| Behavior | [E17] | |||
| [E18] | ||||
| Application | [E19] | |||
| [E20] | ||||
| [E21] | ||||
| [E22] | ||||
| [E23] | ||||
| [E24] | ||||
| [E25] | ||||
| [E26] | ||||
| [E27] | ||||
| Domain-Specifics | [E28] | |||
| [E29] | ||||
| [E30] | ||||
| [E31] | ||||
| [E32] | ||||
| [E33] | ||||
| Expressiveness Values | Total | 0.12 | ||
| Data Model | 0.22 | |||
| Application | 0.00 | |||
| Domain Specifics | 0.00 | |||
| Partially Redundant Constructs | Conjunctive Concepts | |||
| Linked Concepts | ||||